Decrypt SanDisk USB Drives With Passware Kit 2024 v3

Western Digital SanDisk is a well-known and trusted brand in the storage industry. Its USB drives are widely used, thanks to the free, pre-installed PrivateAccess tool that provides secure file encryption and password protection within a private vault. In its recent update, WD removed the “forgot password” option, enhancing security for stolen flash drives but also forcing users to find alternative ways to decrypt their data. This update poses a significant challenge for computer forensics when analyzing flash drives.

Passware Kit 2024 v3 tackles this challenge by introducing a SanDisk decryption option that facilitates the workflow with encrypted USB drives for forensic professionals. It recovers passwords for PrivateAccess, SecureAccess, and ENC vaults at high speeds.

Additionally, BitLocker decryption has been enhanced to support BitLocker hash files used by third-party tools such as hashcat and John the Ripper, and it allows instant decryption of volumes with a known Full Volume Encryption Key (FVEK).

The latest version also includes several usability improvements to make the password recovery process smoother and more efficient.

What’s New in Passware Kit 2024 v3:

  • GPU-accelerated password recovery for SanDisk PrivateAccess
  • Password recovery for BitLocker hashes
  • Instant decryption of BitLocker volumes using FVEK
  • Password hint display
  • Usability improvements

For your convenience, we have included a video of all the latest features of Passware Kit 2024 v3. Take a look!


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.

Unsubscribe any time. We respect your privacy - read our privacy policy.


GPU-accelerated password recovery for SanDisk PrivateAccess

Passware Kit 2024 v3 introduces a SanDisk decryption option that facilitates the workflow with encrypted USB drives for forensic professionals. It recovers passwords for PrivateAccess, SecureAccess, and ENC vaults.

Password recovery for the latest versions of SanDisk PrivateAccess and ENC DataVault can be accelerated on GPU, reaching the speed of 8,000 passwords per second on NVIDIA RTX 4070 Ti.

Password recovery for BitLocker hashes

BitLocker decryption has been enhanced to support BitLocker hash files extracted by third-party tools such as John the Ripper. Save the hash as a text file or use a hashcat file to proceed with password recovery using Passware Kit.

Instant decryption of BitLocker volumes using FVEK

Passware Kit has expanded its BitLocker decryption capabilities to support the Full Volume Encryption Key (FVEK), in addition to the previously supported Volume Master Key (VMK). Users can now specify the FVEK in the “BitLocker VMK/FVEK” field to decrypt the volume instantly.

Password hint display

Passware Kit 2024 v3 instantly extracts and displays password hints for a wider range of file types. These hints might be helpful for adjusting the settings and make the password recovery process more efficient.

The password hints can be extracted for: Apple Notes and iWork files, FileVault2 accounts, APFS disk images, and Western Digital digest files.

Usability improvements

The latest version of Passware Kit introduces several usability improvements. One notable addition is a new option in the “Clear and Reset” menu that allows users to reset all attack settings, preferences, file paths, and Agent network settings to their default values with a single click.

For Adobe PDF files, Passware Kit now offers the ability to create unprotected files after recovering the Owner password.

The password recovery options page has been enhanced with visually appealing icons.

Additionally, the Passware Account portal for PKU, PKF, PKB, and PKM customers now displays SHA-512 hashes for all installation files, ensuring the integrity of the downloads.

Read more about this update on the Passware blog.

Leave a Comment